Cybersecurity Awareness Month 2024

123456789101112131415161718192021222324252627282930
Across
  1. 5. Pop-up malware intent on using fear tactics to get you to perform an action.
  2. 6. Data must be accessible when you need them. Part of the CIA triad.
  3. 10. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
  4. 11. A flaw in a system that can enable an adversary to compromise the security of that system.
  5. 12. A type of threat that includes authorized system users and disgruntled employees.
  6. 16. "Good guy" hackers.
  7. 18. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
  8. 21. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
  9. 22. Multiple compromised systems under the control of a single attacker.
  10. 24. A device that permits the flow of authorized data, while keeping unauthorized data out.
  11. 25. A vulnerability or exploit that is unknown to software developers and security professionals.
  12. 26. A team that acts as the adversary during a security assessment.
  13. 27. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
  14. 28. The broad term for nontraditional, internet-connected smart devices.
  15. 29. A network of devices created for the sole purpose of luring in an attacker.
  16. 30. A protocol used to ensure time synchronization between devices.
Down
  1. 1. The act of moving around, looking for vulnerable Wi-Fi networks.
  2. 2. Hardware and/or software used to capture and record key strokes.
  3. 3. Spear phishing aimed at high-profile targets such as executives.
  4. 4. Cryptography that uses two different keys for encryption and decryption.
  5. 7. Information that can be used to distinguish an individual’s identity.
  6. 8. The act of applying a fix to a software defect.
  7. 9. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
  8. 13. Cryptography that uses the same shared secret key for both encryption and decryption.
  9. 14. An attack from multiple compromised systems that target a single system, service, or application.
  10. 15. Malware intent on holding your data hostage in an attempt to extort money.
  11. 17. Protecting of information from unauthorized access. Part of the CIA triad.
  12. 19. A team usually involved with the defense of the organization’s infrastructure.
  13. 20. An old method programmers use to bypass security to gain access to a system or software. "War Games"
  14. 22. "Bad guy" hackers.
  15. 23. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.